Security in RFID and Sensor Networks (Hardback) book cover

Security in RFID and Sensor Networks

Edited by Paris Kitsos

Series Editor: Yan Zhang

© 2009 – Auerbach Publications

560 pages | 228 B/W Illus.

Purchasing Options:$ = USD
Hardback: 9781420068399
pub: 2009-04-13
eBook (VitalSource) : 9781420068405
pub: 2016-04-19
from $54.88

FREE Standard Shipping!
e–Inspection Copy


In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As always, adequate security remains one of the open areas of concern before wide deployment of RFID and WSNs can be achieved. Security in RFID and Sensor Networks is the first book to offer a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and integrated RFID and WSNs, providing an essential reference for those who regularly interface with these versatile technologies.

Exposes Security Risks

The book begins with a discussion of current security issues that threaten the effective use of RFID technology. The contributors examine multi-tag systems, relay attacks, authentication protocols, lightweight cryptography, and host of other topics related to RFID safety. The book then shifts the focus to WSNs, beginning with a background in sensor network security before moving on to survey intrusion detection, malicious node detection, jamming, and other issues of concern to WSNs and their myriad of applications.

Offers Viable Solutions

In each chapter, the contributors propose effective solutions to the plethora of security challenges that confront users, offering practical examples to aid in intuitive understanding. The last part of the book reviews the security problems inherent in integrated RFID & WSNs. The book ends with a glimpse of the future possibilities in these burgeoning technologies and provides recommendations for the proactive design of secure wireless embedded systems.

Table of Contents

Security in RFID

Multi-Tag RFID Systems, L. Bolotnyy and G. Robins

Attacking RFID Systems, P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda

RFID Relay Attacks: System Analysis,Modeling, and Implementation, A. Lima, A. Miri, and M. Nevins

Physical Privacy and Security in RFID Systems, L. Bolotnyy and G. Robins

Authentication Protocols in RFID Systems, G. Pantelic, S. Bojanic, and V. Tomaševic

Lightweight Cryptography for Low-Cost RFID Tags, P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda

Distance-Bounding Protocols for RFID, J.M. Fajardo and A.P. Domínguez

Secure Proximity Identification for RFID, G.P. Hancke and S. Drimer

Public Key in RFIDs: Appeal for Asymmetry, E.R. Sanchez, F. Gandino, B. Montrucchio, and M. Rebaudengo

Scalable RFID Privacy Protecting Schemes, S. Fouladgar and H. Afifi

A Secure RFID Access Control Mechanism, D. Huang and Z. Zhou

Threat Modeling in EPC-Based Information Sharing Networks, A. Ilic, T. Burbridge, A. Soppera, F. Michahelles, and E. Fleisch

RFID-Based Secure DVD Content Distribution, S. Lian and Z. Liu

Security in Wireless Sensor Networks

A Survey on Security in Wireless Sensor Networks, Q. Wang and T. Zhang

Intrusion Detection in Wireless Sensor Networks, T. Giannetsos, I. Krontiris, T. Dimitriou, and F.C. Freiling

Key Establishment in Wireless Sensor Networks, I. Chatzigiannakis and E. Konstantinou

Malicious Node Detection in Wireless Sensor Networks, Y. Chen, H. Chen, and W.-S. Ku

Jamming in Wireless Sensor Networks, A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou

Concealed Data Aggregation for Wireless Sensor Networks, A.C.-F. Chan

Message Authentication in Surveillance Networks, R. Sbrusch and T.A. Yang

A Broadcasting Authentication Protocol with DoS and Fault Tolerance For Wireless Ad Hoc Networks, Y. Jiang, M. Shi, X. (S.) Shen, C. Lin, and X. Chu

Security in Integerated RFID and WSN

Threats and Vulnerabilities of RFID and Beyond, J.-H. Hoepman and T. Veugen

Finite Field Arithmetic for RFID and Sensor Networks, J.L. Imaña

Designing SecureWireless Embedded Systems, I. Onat and A. Miri


About the Series

Wireless Networks and Mobile Communications

Learn more…

Subject Categories

BISAC Subject Codes/Headings:
COMPUTERS / Security / General
TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications